BlogCyber Security 101 What is a banking trojan and how do you stop one? Zeus, SpyEye, Emotet. What do those names mean to you? As much as they sound…Rob SFebruary 29, 2024
BlogCyber Security 101 How nation-state cyber warfare affects you We live in a time of increased international tensions. You can scarcely open a newspaper…Adam PiltonFebruary 23, 2024
BlogCyber Security 101 Demystifying malware: The 5 stages of a malware attack Malware is almost as old as the first personal computers. And like anything that’s existed…Rob SFebruary 14, 2024
BlogCyber Security 101 What is a remote access takeover? Wherever you look, fraud is on the rise. According to UK Finance, there were 1.4…Rob SFebruary 7, 2024
BlogCyber Security 101 What is fileless malware and how can you safeguard your systems? The most elusive of all malware; fileless malware is a threat you can’t afford to…Rob SJanuary 30, 2024
BlogCyber Security 101 Why small businesses are at greater risk of malware attacks Malware attacks are a well-known concern for businesses, but what type of business is more…Rob SJanuary 22, 2024
BlogCyber Security 101 Lessons from a breached email and inheritance theft We all spend almost every day plugged into our emails. For most of us, this…Adam PiltonJanuary 15, 2024
BlogCyber Security 101 Key takeaways from the CyberSmart SME cost of living crisis report The current economic climate has seen better days, but how are the UK’s small businesses…Rob SJanuary 10, 2024
BlogCyber Security 101 New: CyberSmart’s SME cost of living crisis report At CyberSmart, we recognise that the cost of living crisis not only affects our personal…Rob SJanuary 8, 2024